From agent-almanac
Performs multi-phase deep review of entire codebase covering architecture, security, code quality, UX, and accessibility with severity ratings and prioritized findings for GitHub issues.
npx claudepluginhub pjt222/agent-almanacThis skill uses the workspace's default tool permissions.
---
Conducts full codebase health audit across architecture, security, code quality, dependencies, test coverage. Produces scored report with letter grades and prioritized remediation. Use for existing codebases or before releases.
Orchestrates phased code reviews with specialized agents for quality, architecture, security, performance, testing, documentation, and best practices.
Orchestrates multi-phase code reviews using specialized agents for quality, architecture, security, performance, testing, and documentation. Integrates SonarQube, CodeQL, Semgrep; framework options for React, Django, Spring.
Share bugs, ideas, or general feedback.
Multi-phase deep codebase review producing severity-rated findings with fix-order recommendations. Unlike review-pull-request (scoped to a diff) or single-domain reviews (security-audit-codebase, review-software-architecture), this skill covers an entire project or subproject across all quality dimensions in one pass.
target_path — root directory of the codebase or subproject to reviewscope — which phases to run: full (default), security, architecture, quality, uxoutput_format — findings (table only), report (narrative), both (default)severity_threshold — minimum severity to include: LOW (default), MEDIUM, HIGH, CRITICALInventory the codebase to establish scope and identify review targets.
find target_path -type f | sort by extensionExpected: A factual inventory — file counts, languages, test presence, dependency health. No judgments yet.
On failure: If the target path is empty or inaccessible, stop and report. If specific subdirectories are inaccessible, note them and continue with what is available.
Assess structural health: coupling, duplication, data flow, and separation of concerns.
Expected: A list of architectural findings with severity ratings and file references. Common findings: mode dispatch duplication, missing abstraction layers, circular dependencies.
On failure: If the codebase is too small for meaningful architecture review (< 5 files), note this and skip to Step 3. Architecture review requires enough code to have structure.
Identify security vulnerabilities and defensive coding gaps.
innerHTML), SQL injection, command injectionExpected: A list of security findings with severity, affected files, and remediation guidance. CRITICAL findings include injection vulnerabilities and exposed secrets.
On failure: If no security-relevant code exists (pure documentation project), note this and skip to Step 4.
Evaluate maintainability, readability, and defensive coding.
Expected: A list of quality findings focused on maintainability. Common findings: magic numbers, inconsistent patterns, missing guards.
On failure: If the codebase is generated or minified, note this and adjust expectations. Generated code has different quality criteria than hand-written code.
Evaluate user experience and accessibility compliance.
Expected: A list of UX/a11y findings with WCAG references where applicable. If no frontend exists, this step produces "N/A — no frontend code detected."
On failure: If frontend code exists but cannot be rendered (missing build step), audit the source code statically and note that runtime testing was not possible.
Compile all findings into a prioritized summary.
Expected: A findings table with columns: #, Severity, Phase, File(s), Finding, Fix. A fix-order recommendation that accounts for dependencies (e.g., "refactor architecture before adding tests").
On failure: If no findings were produced, this is itself a finding — either the codebase is exceptionally clean or the review was too shallow. Re-examine at least one phase with deeper inspection.
output_format includes report, narrative sections accompany the tableBetween review phases, use /rest as a checkpoint — especially between phases 2-5, which require different analytical perspectives. A checkpoint rest (brief, transitional) prevents the momentum of one phase from biasing the next. See the rest skill's "Scaling Rest" section for guidance on checkpoint vs full rest.
security-audit-codebase — deep-dive security audit when the review-codebase security phase reveals complex vulnerabilitiesreview-software-architecture — detailed architecture review for specific subsystemsreview-ux-ui — comprehensive UX/accessibility audit beyond what phase 5 coversreview-pull-request — diff-scoped review for individual changesclean-codebase — implements the code quality fixes identified by this reviewcreate-github-issues — converts findings table into tracked GitHub issues